mirror of
https://github.com/containers/podman.git
synced 2025-06-28 14:29:04 +08:00
Add codespell to validate spelling mistakes in code.
Fix all errors found by codespell Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
@ -111,7 +111,7 @@ gating_task:
|
|||||||
build_script:
|
build_script:
|
||||||
- '/usr/local/bin/entrypoint.sh podman |& ${TIMESTAMP}'
|
- '/usr/local/bin/entrypoint.sh podman |& ${TIMESTAMP}'
|
||||||
- 'cd $GOSRC && ./hack/podman-commands.sh |& ${TIMESTAMP}'
|
- 'cd $GOSRC && ./hack/podman-commands.sh |& ${TIMESTAMP}'
|
||||||
# N/B: need 'clean' so some commited files are re-generated.
|
# N/B: need 'clean' so some committed files are re-generated.
|
||||||
- '/usr/local/bin/entrypoint.sh clean podman-remote |& ${TIMESTAMP}'
|
- '/usr/local/bin/entrypoint.sh clean podman-remote |& ${TIMESTAMP}'
|
||||||
- '/usr/local/bin/entrypoint.sh clean podman BUILDTAGS="exclude_graphdriver_devicemapper selinux seccomp" |& ${TIMESTAMP}'
|
- '/usr/local/bin/entrypoint.sh clean podman BUILDTAGS="exclude_graphdriver_devicemapper selinux seccomp" |& ${TIMESTAMP}'
|
||||||
- '/usr/local/bin/entrypoint.sh podman-remote-darwin |& ${TIMESTAMP}'
|
- '/usr/local/bin/entrypoint.sh podman-remote-darwin |& ${TIMESTAMP}'
|
||||||
|
2
API.md
2
API.md
@ -1065,7 +1065,7 @@ varlink call -m unix:/run/podman/io.podman/io.podman.RemoveImage '{"name": "regi
|
|||||||
|
|
||||||
method RemoveImageWithResponse(name: [string](https://godoc.org/builtin#string), force: [bool](https://godoc.org/builtin#bool)) [RemoveImageResponse](#RemoveImageResponse)</div>
|
method RemoveImageWithResponse(name: [string](https://godoc.org/builtin#string), force: [bool](https://godoc.org/builtin#bool)) [RemoveImageResponse](#RemoveImageResponse)</div>
|
||||||
RemoveImageWithResponse takes the name or ID of an image as well as a boolean that determines if containers using that image
|
RemoveImageWithResponse takes the name or ID of an image as well as a boolean that determines if containers using that image
|
||||||
should be deleted. If the image cannot be found, an [ImageNotFound](#ImageNotFound) error will be returned. The reponse is
|
should be deleted. If the image cannot be found, an [ImageNotFound](#ImageNotFound) error will be returned. The response is
|
||||||
in the form of a RemoveImageResponse .
|
in the form of a RemoveImageResponse .
|
||||||
### <a name="RemovePod"></a>func RemovePod
|
### <a name="RemovePod"></a>func RemovePod
|
||||||
<div style="background-color: #E8E8E8; padding: 15px; margin: 10px; border-radius: 10px;">
|
<div style="background-color: #E8E8E8; padding: 15px; margin: 10px; border-radius: 10px;">
|
||||||
|
3
Makefile
3
Makefile
@ -351,6 +351,9 @@ install-podman-remote-%-docs: podman-remote docs $(MANPAGES)
|
|||||||
man-page-check:
|
man-page-check:
|
||||||
hack/man-page-checker
|
hack/man-page-checker
|
||||||
|
|
||||||
|
codespell:
|
||||||
|
codespell -S bin,vendor,.git,go.sum,changelog.txt,seccomp.json,.cirrus.yml,"*.xz,*.gz,*.tar,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L uint,iff,od,seeked
|
||||||
|
|
||||||
# When publishing releases include critical build-time details
|
# When publishing releases include critical build-time details
|
||||||
.PHONY: release.txt
|
.PHONY: release.txt
|
||||||
release.txt:
|
release.txt:
|
||||||
|
@ -49,11 +49,11 @@ func pruneContainersCmd(c *cliconfig.PruneContainersValues) error {
|
|||||||
reader := bufio.NewReader(os.Stdin)
|
reader := bufio.NewReader(os.Stdin)
|
||||||
fmt.Printf(`WARNING! This will remove all stopped containers.
|
fmt.Printf(`WARNING! This will remove all stopped containers.
|
||||||
Are you sure you want to continue? [y/N] `)
|
Are you sure you want to continue? [y/N] `)
|
||||||
ans, err := reader.ReadString('\n')
|
answer, err := reader.ReadString('\n')
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrapf(err, "error reading input")
|
return errors.Wrapf(err, "error reading input")
|
||||||
}
|
}
|
||||||
if strings.ToLower(ans)[0] != 'y' {
|
if strings.ToLower(answer)[0] != 'y' {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -25,7 +25,7 @@ func outputError(err error) {
|
|||||||
}
|
}
|
||||||
var ne error
|
var ne error
|
||||||
switch e := err.(type) {
|
switch e := err.(type) {
|
||||||
// For some reason golang wont let me list them with commas so listing them all.
|
// For some reason golang won't let me list them with commas so listing them all.
|
||||||
case *iopodman.ImageNotFound:
|
case *iopodman.ImageNotFound:
|
||||||
ne = errors.New(e.Reason)
|
ne = errors.New(e.Reason)
|
||||||
case *iopodman.ContainerNotFound:
|
case *iopodman.ContainerNotFound:
|
||||||
@ -48,7 +48,7 @@ func outputError(err error) {
|
|||||||
func setExitCode(err error) int {
|
func setExitCode(err error) int {
|
||||||
cause := errors.Cause(err)
|
cause := errors.Cause(err)
|
||||||
switch e := cause.(type) {
|
switch e := cause.(type) {
|
||||||
// For some reason golang wont let me list them with commas so listing them all.
|
// For some reason golang won't let me list them with commas so listing them all.
|
||||||
case *iopodman.ContainerNotFound:
|
case *iopodman.ContainerNotFound:
|
||||||
return 1
|
return 1
|
||||||
case *iopodman.InvalidState:
|
case *iopodman.InvalidState:
|
||||||
|
@ -47,11 +47,11 @@ func pruneImagesCmd(c *cliconfig.PruneImagesValues) error {
|
|||||||
fmt.Printf(`
|
fmt.Printf(`
|
||||||
WARNING! This will remove all dangling images.
|
WARNING! This will remove all dangling images.
|
||||||
Are you sure you want to continue? [y/N] `)
|
Are you sure you want to continue? [y/N] `)
|
||||||
ans, err := reader.ReadString('\n')
|
answer, err := reader.ReadString('\n')
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrapf(err, "error reading input")
|
return errors.Wrapf(err, "error reading input")
|
||||||
}
|
}
|
||||||
if strings.ToLower(ans)[0] != 'y' {
|
if strings.ToLower(answer)[0] != 'y' {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,11 @@ WARNING! This will remove:
|
|||||||
- all images
|
- all images
|
||||||
- all build cache
|
- all build cache
|
||||||
Are you sure you want to continue? [y/N] `)
|
Are you sure you want to continue? [y/N] `)
|
||||||
ans, err := reader.ReadString('\n')
|
answer, err := reader.ReadString('\n')
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrapf(err, "error reading input")
|
return errors.Wrapf(err, "error reading input")
|
||||||
}
|
}
|
||||||
if strings.ToLower(ans)[0] != 'y' {
|
if strings.ToLower(answer)[0] != 'y' {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -8,7 +8,7 @@ import (
|
|||||||
/*
|
/*
|
||||||
attention
|
attention
|
||||||
|
|
||||||
in this file you will see alot of struct duplication. this was done because people wanted a strongly typed
|
in this file you will see a lot of struct duplication. this was done because people wanted a strongly typed
|
||||||
varlink mechanism. this resulted in us creating this intermediate layer that allows us to take the input
|
varlink mechanism. this resulted in us creating this intermediate layer that allows us to take the input
|
||||||
from the cli and make an intermediate layer which can be transferred as strongly typed structures over a varlink
|
from the cli and make an intermediate layer which can be transferred as strongly typed structures over a varlink
|
||||||
interface.
|
interface.
|
||||||
|
@ -6,7 +6,7 @@ package shared
|
|||||||
/*
|
/*
|
||||||
attention
|
attention
|
||||||
|
|
||||||
in this file you will see alot of struct duplication. this was done because people wanted a strongly typed
|
in this file you will see a lot of struct duplication. this was done because people wanted a strongly typed
|
||||||
varlink mechanism. this resulted in us creating this intermediate layer that allows us to take the input
|
varlink mechanism. this resulted in us creating this intermediate layer that allows us to take the input
|
||||||
from the cli and make an intermediate layer which can be transferred as strongly typed structures over a varlink
|
from the cli and make an intermediate layer which can be transferred as strongly typed structures over a varlink
|
||||||
interface.
|
interface.
|
||||||
|
@ -63,11 +63,11 @@ WARNING! This will remove:
|
|||||||
- all dangling images
|
- all dangling images
|
||||||
- all build cache
|
- all build cache
|
||||||
Are you sure you want to continue? [y/N] `, volumeString)
|
Are you sure you want to continue? [y/N] `, volumeString)
|
||||||
ans, err := reader.ReadString('\n')
|
answer, err := reader.ReadString('\n')
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrapf(err, "error reading input")
|
return errors.Wrapf(err, "error reading input")
|
||||||
}
|
}
|
||||||
if strings.ToLower(ans)[0] != 'y' {
|
if strings.ToLower(answer)[0] != 'y' {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -885,7 +885,7 @@ method UntagImage(name: string, tag: string) -> (image: string)
|
|||||||
method RemoveImage(name: string, force: bool) -> (image: string)
|
method RemoveImage(name: string, force: bool) -> (image: string)
|
||||||
|
|
||||||
# RemoveImageWithResponse takes the name or ID of an image as well as a boolean that determines if containers using that image
|
# RemoveImageWithResponse takes the name or ID of an image as well as a boolean that determines if containers using that image
|
||||||
# should be deleted. If the image cannot be found, an [ImageNotFound](#ImageNotFound) error will be returned. The reponse is
|
# should be deleted. If the image cannot be found, an [ImageNotFound](#ImageNotFound) error will be returned. The response is
|
||||||
# in the form of a RemoveImageResponse .
|
# in the form of a RemoveImageResponse .
|
||||||
method RemoveImageWithResponse(name: string, force: bool) -> (response: RemoveImageResponse)
|
method RemoveImageWithResponse(name: string, force: bool) -> (response: RemoveImageResponse)
|
||||||
|
|
||||||
|
@ -74,11 +74,11 @@ func volumePruneCmd(c *cliconfig.VolumePruneValues) error {
|
|||||||
reader := bufio.NewReader(os.Stdin)
|
reader := bufio.NewReader(os.Stdin)
|
||||||
fmt.Println("WARNING! This will remove all volumes not used by at least one container.")
|
fmt.Println("WARNING! This will remove all volumes not used by at least one container.")
|
||||||
fmt.Print("Are you sure you want to continue? [y/N] ")
|
fmt.Print("Are you sure you want to continue? [y/N] ")
|
||||||
ans, err := reader.ReadString('\n')
|
answer, err := reader.ReadString('\n')
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrapf(err, "error reading input")
|
return errors.Wrapf(err, "error reading input")
|
||||||
}
|
}
|
||||||
if strings.ToLower(ans)[0] != 'y' {
|
if strings.ToLower(answer)[0] != 'y' {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -366,7 +366,7 @@ __podman_to_extglob() {
|
|||||||
# continue processing its completion.
|
# continue processing its completion.
|
||||||
#
|
#
|
||||||
# TODO if the preceding command has options that accept arguments and an
|
# TODO if the preceding command has options that accept arguments and an
|
||||||
# argument is equal ot one of the subcommands, this is falsely detected as
|
# argument is equal to one of the subcommands, this is falsely detected as
|
||||||
# a match.
|
# a match.
|
||||||
__podman_subcommands() {
|
__podman_subcommands() {
|
||||||
local subcommands="$1"
|
local subcommands="$1"
|
||||||
|
@ -196,7 +196,7 @@ as the standard 'cloud-init' services.
|
|||||||
in the ``test_build_vm_images`` Task (above).
|
in the ``test_build_vm_images`` Task (above).
|
||||||
|
|
||||||
* Base images do not need to be produced often, but doing so completely
|
* Base images do not need to be produced often, but doing so completely
|
||||||
manually would be time-consuming and error-prone. Therefor a special
|
manually would be time-consuming and error-prone. Therefore a special
|
||||||
semi-automatic *Makefile* target is provided to assist with producing
|
semi-automatic *Makefile* target is provided to assist with producing
|
||||||
all the base-images: ``libpod_base_images``
|
all the base-images: ``libpod_base_images``
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
# %if ! 0% {?gobuild:1}
|
# %if ! 0% {?gobuild:1}
|
||||||
%define gobuild(o:) go build -tags="$BUILDTAGS" -ldflags "${LDFLAGS:-} -B 0x$(head -c20 /dev/urandom|od -An -tx1|tr -d ' \\n')" -a -v -x %{?**};
|
%define gobuild(o:) go build -tags="$BUILDTAGS" -ldflags "${LDFLAGS:-} -B 0x$(head -c20 /dev/urandom|of -An -tx1|tr -d ' \\n')" -a -v -x %{?**};
|
||||||
#% endif
|
#% endif
|
||||||
|
|
||||||
# libpod hack directory
|
# libpod hack directory
|
||||||
|
2
dependencies/analyses/README.md
vendored
2
dependencies/analyses/README.md
vendored
@ -1,7 +1,7 @@
|
|||||||
# A set of scripts and instructions that help to analyze and debloat go-lang dependencies
|
# A set of scripts and instructions that help to analyze and debloat go-lang dependencies
|
||||||
|
|
||||||
Note that all scripts mentioned below follow the [KISS principle](https://en.wikipedia.org/wiki/KISS_principle) on purpose.
|
Note that all scripts mentioned below follow the [KISS principle](https://en.wikipedia.org/wiki/KISS_principle) on purpose.
|
||||||
The scripts are meant to be used in combination to aid in understanding the packages' dependencies and how they contribute to the size of the compiled binary.
|
The scripts are meant to be used in combination to aid in understanding the package's dependencies and how they contribute to the size of the compiled binary.
|
||||||
|
|
||||||
## Size of packages
|
## Size of packages
|
||||||
|
|
||||||
|
@ -797,7 +797,7 @@ You can pass `host` to copy the current configuration from the host.
|
|||||||
|
|
||||||
Sets the username or UID used and optionally the groupname or GID for the specified command.
|
Sets the username or UID used and optionally the groupname or GID for the specified command.
|
||||||
|
|
||||||
The followings examples are all valid:
|
The following examples are all valid:
|
||||||
--user [user | user:group | uid | uid:gid | user:gid | uid:group ]
|
--user [user | user:group | uid | uid:gid | user:gid | uid:group ]
|
||||||
|
|
||||||
Without this argument the command will be run as root in the container.
|
Without this argument the command will be run as root in the container.
|
||||||
|
@ -834,7 +834,7 @@ You can pass `host` to copy the current configuration from the host.
|
|||||||
|
|
||||||
Sets the username or UID used and optionally the groupname or GID for the specified command.
|
Sets the username or UID used and optionally the groupname or GID for the specified command.
|
||||||
|
|
||||||
The followings examples are all valid:
|
The following examples are all valid:
|
||||||
--user [user | user:group | uid | uid:gid | user:gid | uid:group ]
|
--user [user | user:group | uid | uid:gid | user:gid | uid:group ]
|
||||||
|
|
||||||
Without this argument the command will be run as root in the container.
|
Without this argument the command will be run as root in the container.
|
||||||
|
@ -1527,7 +1527,7 @@ func GetLayersMapWithImageInfo(imageruntime *Runtime) (map[string]*LayerInfo, er
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// scan all layers & add all childs for each layers to layerInfo
|
// scan all layers & add all childid's for each layers to layerInfo
|
||||||
for _, layer := range layers {
|
for _, layer := range layers {
|
||||||
_, ok := layerInfoMap[layer.ID]
|
_, ok := layerInfoMap[layer.ID]
|
||||||
if ok {
|
if ok {
|
||||||
|
@ -310,13 +310,13 @@ func ocicniPortMappingToContainerPort(portMappings []ocicni.PortMapping) ([]v1.C
|
|||||||
func libpodEnvVarsToKubeEnvVars(envs []string) ([]v1.EnvVar, error) {
|
func libpodEnvVarsToKubeEnvVars(envs []string) ([]v1.EnvVar, error) {
|
||||||
var envVars []v1.EnvVar
|
var envVars []v1.EnvVar
|
||||||
for _, e := range envs {
|
for _, e := range envs {
|
||||||
splitE := strings.SplitN(e, "=", 2)
|
split := strings.SplitN(e, "=", 2)
|
||||||
if len(splitE) != 2 {
|
if len(split) != 2 {
|
||||||
return envVars, errors.Errorf("environment variable %s is malformed; should be key=value", e)
|
return envVars, errors.Errorf("environment variable %s is malformed; should be key=value", e)
|
||||||
}
|
}
|
||||||
ev := v1.EnvVar{
|
ev := v1.EnvVar{
|
||||||
Name: splitE[0],
|
Name: split[0],
|
||||||
Value: splitE[1],
|
Value: split[1],
|
||||||
}
|
}
|
||||||
envVars = append(envVars, ev)
|
envVars = append(envVars, ev)
|
||||||
}
|
}
|
||||||
|
@ -255,7 +255,7 @@ func (r *Runtime) setupRootlessNetNS(ctr *Container) (err error) {
|
|||||||
}
|
}
|
||||||
defer func() {
|
defer func() {
|
||||||
if err := cmd.Process.Release(); err != nil {
|
if err := cmd.Process.Release(); err != nil {
|
||||||
logrus.Errorf("unable to release comman process: %q", err)
|
logrus.Errorf("unable to release command process: %q", err)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
@ -375,7 +375,7 @@ func (r *LocalRuntime) selectDetachKeys(flagValue string) (string, error) {
|
|||||||
|
|
||||||
config, err := r.GetConfig()
|
config, err := r.GetConfig()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", errors.Wrapf(err, "unable to retrive runtime config")
|
return "", errors.Wrapf(err, "unable to retrieve runtime config")
|
||||||
}
|
}
|
||||||
if config.DetachKeys != "" {
|
if config.DetachKeys != "" {
|
||||||
return config.DetachKeys, nil
|
return config.DetachKeys, nil
|
||||||
|
@ -59,7 +59,7 @@ type Volume struct {
|
|||||||
// VolumeFilter is for filtering volumes on the client
|
// VolumeFilter is for filtering volumes on the client
|
||||||
type VolumeFilter func(*Volume) bool
|
type VolumeFilter func(*Volume) bool
|
||||||
|
|
||||||
// GetRuntimeNoStore returns a localruntime struct wit an embedded runtime but
|
// GetRuntimeNoStore returns a localruntime struct with an embedded runtime but
|
||||||
// without a configured storage.
|
// without a configured storage.
|
||||||
func GetRuntimeNoStore(ctx context.Context, c *cliconfig.PodmanCommand) (*LocalRuntime, error) {
|
func GetRuntimeNoStore(ctx context.Context, c *cliconfig.PodmanCommand) (*LocalRuntime, error) {
|
||||||
runtime, err := libpodruntime.GetRuntimeNoStore(ctx, c)
|
runtime, err := libpodruntime.GetRuntimeNoStore(ctx, c)
|
||||||
|
@ -25,7 +25,7 @@ Tools consuming this format may also opt to monitor the hook directories for cha
|
|||||||
|
|
||||||
Hooks are injected in the order obtained by sorting the JSON file names, after converting them to lower case, based on their Unicode code points.
|
Hooks are injected in the order obtained by sorting the JSON file names, after converting them to lower case, based on their Unicode code points.
|
||||||
For example, a matching hook defined in `01-my-hook.json` would be injected before matching hooks defined in `02-another-hook.json` and `01-UPPERCASE.json`.
|
For example, a matching hook defined in `01-my-hook.json` would be injected before matching hooks defined in `02-another-hook.json` and `01-UPPERCASE.json`.
|
||||||
It is strongly recommended to make the sort oder unambiguous depending on an ASCII-only prefix (like the `01`/`02` above).
|
It is strongly recommended to make the sort order unambiguous depending on an ASCII-only prefix (like the `01`/`02` above).
|
||||||
|
|
||||||
Each JSON file should contain an object with one of the following schemas.
|
Each JSON file should contain an object with one of the following schemas.
|
||||||
|
|
||||||
|
@ -42,7 +42,7 @@ var _ = Describe("Podman healthcheck run", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
It("podman healthcheck on valid container", func() {
|
It("podman healthcheck on valid container", func() {
|
||||||
Skip("Extremely consistent flake - reenable on debugging")
|
Skip("Extremely consistent flake - re-enable on debugging")
|
||||||
session := podmanTest.Podman([]string{"run", "-dt", "--name", "hc", healthcheck})
|
session := podmanTest.Podman([]string{"run", "-dt", "--name", "hc", healthcheck})
|
||||||
session.WaitWithDefaultTimeout()
|
session.WaitWithDefaultTimeout()
|
||||||
Expect(session.ExitCode()).To(Equal(0))
|
Expect(session.ExitCode()).To(Equal(0))
|
||||||
|
@ -205,7 +205,7 @@ var _ = Describe("Podman mount", func() {
|
|||||||
Expect(lmount.OutputToString()).To(Equal(""))
|
Expect(lmount.OutputToString()).To(Equal(""))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("podman list mulitple mounted containers", func() {
|
It("podman list multiple mounted containers", func() {
|
||||||
SkipIfRootless()
|
SkipIfRootless()
|
||||||
|
|
||||||
setup := podmanTest.Podman([]string{"create", ALPINE, "ls"})
|
setup := podmanTest.Podman([]string{"create", ALPINE, "ls"})
|
||||||
|
@ -47,7 +47,7 @@ var _ = Describe("Podman run with --sig-proxy", func() {
|
|||||||
|
|
||||||
Specify("signals are forwarded to container using sig-proxy", func() {
|
Specify("signals are forwarded to container using sig-proxy", func() {
|
||||||
if podmanTest.Host.Arch == "ppc64le" {
|
if podmanTest.Host.Arch == "ppc64le" {
|
||||||
Skip("Doesnt work on ppc64le")
|
Skip("Doesn't work on ppc64le")
|
||||||
}
|
}
|
||||||
signal := syscall.SIGFPE
|
signal := syscall.SIGFPE
|
||||||
// Set up a socket for communication
|
// Set up a socket for communication
|
||||||
|
@ -51,7 +51,7 @@ var _ = Describe("Podman save", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
It("podman save with stdout", func() {
|
It("podman save with stdout", func() {
|
||||||
Skip("Pipe redirection in ginkgo probably wont work")
|
Skip("Pipe redirection in ginkgo probably won't work")
|
||||||
outfile := filepath.Join(podmanTest.TempDir, "alpine.tar")
|
outfile := filepath.Join(podmanTest.TempDir, "alpine.tar")
|
||||||
|
|
||||||
save := podmanTest.PodmanNoCache([]string{"save", ALPINE, ">", outfile})
|
save := podmanTest.PodmanNoCache([]string{"save", ALPINE, ">", outfile})
|
||||||
|
@ -40,7 +40,7 @@ var _ = Describe("Podman commit", func() {
|
|||||||
// run the container to be committed
|
// run the container to be committed
|
||||||
_ = endpointTest.startTopContainer("top")
|
_ = endpointTest.startTopContainer("top")
|
||||||
result := endpointTest.Varlink("Commit", string(b), false)
|
result := endpointTest.Varlink("Commit", string(b), false)
|
||||||
// This indicates an error occured
|
// This indicates an error occurred
|
||||||
Expect(len(result.StdErrToString())).To(BeNumerically(">", 0))
|
Expect(len(result.StdErrToString())).To(BeNumerically(">", 0))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -70,7 +70,7 @@ have been omitted as they are verified by repeated implied use.
|
|||||||
- [ ] Container runlabel, exists, checkpoint, exists, restore, stop, prune
|
- [ ] Container runlabel, exists, checkpoint, exists, restore, stop, prune
|
||||||
|
|
||||||
- Using pre-existing remote image, start it with 'podman container runlabel --pull'
|
- Using pre-existing remote image, start it with 'podman container runlabel --pull'
|
||||||
- Run a named container that exits immediatly
|
- Run a named container that exits immediately
|
||||||
- Confirm 'container exists' zero exit (both containers)
|
- Confirm 'container exists' zero exit (both containers)
|
||||||
- Checkpoint the running container
|
- Checkpoint the running container
|
||||||
- Confirm 'container exists' non-zero exit (runlabel container)
|
- Confirm 'container exists' non-zero exit (runlabel container)
|
||||||
|
@ -39,13 +39,13 @@ fi
|
|||||||
|
|
||||||
|
|
||||||
########
|
########
|
||||||
# Create a named and unamed pod
|
# Create a named and unnamed pod
|
||||||
########
|
########
|
||||||
podman pod create --name foobar
|
podman pod create --name foobar
|
||||||
podid=$(podman pod create)
|
podid=$(podman pod create)
|
||||||
|
|
||||||
########
|
########
|
||||||
# Delete a named and unamed pod
|
# Delete a named and unnamed pod
|
||||||
########
|
########
|
||||||
podman pod rm foobar
|
podman pod rm foobar
|
||||||
podman pod rm $podid
|
podman pod rm $podid
|
||||||
|
@ -115,7 +115,7 @@ var _ = Describe("Common functions test", func() {
|
|||||||
bytes, _ := ioutil.ReadAll(read)
|
bytes, _ := ioutil.ReadAll(read)
|
||||||
json.Unmarshal(bytes, compareData)
|
json.Unmarshal(bytes, compareData)
|
||||||
|
|
||||||
Expect(reflect.DeepEqual(testData, compareData)).To(BeTrue(), "Data chaned after we store it to file.")
|
Expect(reflect.DeepEqual(testData, compareData)).To(BeTrue(), "Data changed after we store it to file.")
|
||||||
})
|
})
|
||||||
|
|
||||||
DescribeTable("Test Containerized",
|
DescribeTable("Test Containerized",
|
||||||
|
@ -431,7 +431,7 @@ or as root if your user has not enough privileges.
|
|||||||
|
|
||||||
### 18) `podman run` fails with "bpf create: permission denied error"
|
### 18) `podman run` fails with "bpf create: permission denied error"
|
||||||
|
|
||||||
The Kernel Lockdown patches deny eBPF programs when Secure Boot is enabled in the BIOS. [Matthew Garrett's post](https://mjg59.dreamwidth.org/50577.html) desribes the relationship between Lockdown and Secure Boot and [Jan-Philip Gehrcke's](https://gehrcke.de/2019/09/running-an-ebpf-program-may-require-lifting-the-kernel-lockdown/) connects this with eBPF. [RH bug 1768125](https://bugzilla.redhat.com/show_bug.cgi?id=1768125) contains some additional details.
|
The Kernel Lockdown patches deny eBPF programs when Secure Boot is enabled in the BIOS. [Matthew Garrett's post](https://mjg59.dreamwidth.org/50577.html) describes the relationship between Lockdown and Secure Boot and [Jan-Philip Gehrcke's](https://gehrcke.de/2019/09/running-an-ebpf-program-may-require-lifting-the-kernel-lockdown/) connects this with eBPF. [RH bug 1768125](https://bugzilla.redhat.com/show_bug.cgi?id=1768125) contains some additional details.
|
||||||
|
|
||||||
#### Symptom
|
#### Symptom
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user